[OSPF] RFC 7474 on Security Extension for OSPFv2 When Using Manual Key Management

rfc-editor@rfc-editor.org Mon, 13 April 2015 23:34 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096251ACEA2; Mon, 13 Apr 2015 16:34:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.912
X-Spam-Level:
X-Spam-Status: No, score=-101.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vle7oqStm5II; Mon, 13 Apr 2015 16:34:54 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) by ietfa.amsl.com (Postfix) with ESMTP id 9951B1ACEA1; Mon, 13 Apr 2015 16:34:54 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 177E2180206; Mon, 13 Apr 2015 16:34:22 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 6000:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20150413233422.177E2180206@rfc-editor.org>
Date: Mon, 13 Apr 2015 16:34:22 -0700 (PDT)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ospf/Bkc0FEqI4NTvyCpVeK7J_GRbLPE>
Cc: drafts-update-ref@iana.org, ospf@ietf.org, rfc-editor@rfc-editor.org
Subject: [OSPF] RFC 7474 on Security Extension for OSPFv2 When Using Manual Key Management
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2015 23:34:56 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 7474

        Title:      Security Extension for OSPFv2 When 
                    Using Manual Key Management 
        Author:     M. Bhatia, S. Hartman,
                    D. Zhang, A. Lindem, Ed.
        Status:     Standards Track
        Stream:     IETF
        Date:       April 2015
        Mailbox:    manav@ionosnetworks.com, 
                    hartmans-ietf@mit.edu, 
                    dacheng.zhang@gmail.com,
                    acee@cisco.com
        Pages:      14
        Characters: 31832
        Updates:    RFC 2328, RFC 5709

        I-D Tag:    draft-ietf-ospf-security-extension-manual-keying-11.txt

        URL:        https://www.rfc-editor.org/info/rfc7474

The current OSPFv2 cryptographic authentication mechanism as defined
in RFCs 2328 and 5709 is vulnerable to both inter-session and intra-
session replay attacks when using manual keying.  Additionally, the
existing cryptographic authentication mechanism does not cover the IP
header.  This omission can be exploited to carry out various types of
attacks.

This document defines changes to the authentication sequence number
mechanism that will protect OSPFv2 from both inter-session and intra-
session replay attacks when using manual keys for securing OSPFv2
protocol packets.  Additionally, we also describe some changes in the
cryptographic hash computation that will eliminate attacks resulting
from OSPFv2 not protecting the IP header.

This document is a product of the Open Shortest Path First IGP Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC